Confidentiality & Privacy Flashcards
What kind of party losses are compensatory damages?
3rd party losses because they provide restitution for the harm caused to consumers.
What is symmetric key encryption?
- It is a type of encryption that uses the same private key for encryption and decryption.
- This encryption type is good for protecting data at rest in a database.
- It uses Advanced Encryption Standard (AES) to generate keys of 128, 192, or 256 bits.
What is asymmetric encryption?
- It is encryption in which a public key is used for encryption and private key is used for decryption.
- Asymmetric encryption uses the RSA algorithm to generate keys.
This encryption uses key length of 2048, 3072, or 4096 bits.
What is the RSA algorithm?
- It is an algorithm in which RSA is used in blockchain technology, for digital signatures, and situations where identification is necessary.
- RSA requires much larger keys than AES, usually 2048, 3072, or 4096 bits.
What does symmetric encryption secure?
It secures the actual data being transmitted.
What does asymmetric encryption do?
It it used to establish a secure communication channel
What is a suitable choice for securing email communication or messaging applications?
Asymmetric encryption because there are separate public and private keys
Merchants that process credit cards must comply with what?
Payment Card Industry Data Security Standard (PCI DSS)
What is tokenization?
- It is a data obfuscation (process of concealing information) technique where it substitutes a customer’s credit card number with a random alphanumeric string (the token).
- The merchant transfers the token to the payment processor who then tokenizes (a process of HIDING your customer’s card information with a randomly generated series of letters and numbers or an alphanumeric string of characters called a “token” that can only be decrypted by the bank when processing a transaction) the token to confirm payment.
What does encryption use that tokenization doesn’t use?
Keys
What is data masking?
- AKA DATA REPLACEMENT
- It is a technique in which the masking PERMANENTLY substitutes data with fake data that appears equivalent to the original.
- Ex: Denny Miyasato becomes Joel Kasten
When you hear MASK, think of Halloween masks.
What is data replacement?
AKA HASHING
It involves replacing real data with meaningless symbols
What are the 4 phases of the data life cycle?
- Creation/collection
- Use
- Storage
- Disposal
Management should design and implement controls that ensure that data collection forms ask for what?
The MINIMUM INFORMATION NECESSARY for legitimate and lawful purposes
What are examples of risk assessment procedures?
- Re-performance (walkthrough)
- Inquiry
- Inspection
- Observation